Subjects -> PATENTS, TRADEMARKS AND COPYRIGHTS (Total: 29 journals)
|
|
|
- Nothing Personal, It’s Just Business: How Google’s Course of Business
Operates at the Expense of Consumer Privacy, 33 J. Marshall J. Info. Tech. & Privacy L. 187 (2018)- Authors: Kayla McKinnon
PubDate: Wed, 06 Jun 2018 13:11:34 PDT
- Are “Evan’s Law” and the Textalyzer Immediate Solutions to Today’s
Rapid Changes in Technology or Encroachments on Drivers’ Privacy Rights', 33 J. Marshall J. Info. Tech. & Privacy L. 143 (2018)- Authors: Aggie Baumert
PubDate: Wed, 06 Jun 2018 13:11:27 PDT
- Oversharenting: Is It Really Your Story to Tell', 33 J. Marshall J.
Info. Tech. & Privacy L. 121 (2018)- Authors: Holly Kathleen Hall
Abstract: Social media is about sharing information. If you are a parent, often the tendency is to relate every aspect of your children’s lives. Most of the time, children do not consent to postings about them and will have a permanent digital shadow created by their parents that follows them the rest of their lives. The purpose of this article is to analyze the current status and potential future of children’s online privacy from a comparative legal approach, highlighting recent case law in the United Kingdom, which is trending toward carving out special privacy rights for children. This contrasts with the United States approach, where once a photo or similar content is posted online, a right to privacy is essentially lost. Based on recent United States Supreme Court case opinions, and the state law movement to regulate in this area, as exemplified by the so-called “Eraser Law” in California. the time may be ripe to reexamine the “reasonable expectation of privacy” for children online and develop methods and a cause of action that allow children to take control of their own online story. PubDate: Wed, 06 Jun 2018 13:11:20 PDT
- Protecting Colleges & Universities Against Real Losses in a Virtual World,
33 J. Marshall J. Info. Tech. & Privacy L. 101 (2017)- Authors: Gregory Demers et al.
Abstract: Colleges and universities are prime targets for cyberattacks. Authors Gregory L. Demers, Seth C. Harrington, Mark A. Cianci, and Nicholas R. Green explore emerging data security risks and litigation trends on college campuses, and offer ways to manage these risks through a comprehensive insurance plan. Given the increasing variety and complexity of plans available, it is incumbent upon universities to regularly reassess the coverage afforded by their existing policies. PubDate: Mon, 05 Mar 2018 10:37:45 PST
- Exposure to Police Brutality Allows for Transparency and Accountability of
Law Enforcement, 33 J. Marshall J. Info. Tech. & Privacy L. 75 (2017)- Authors: Kendal Harden
Abstract: Thanks to the advancements in technology and valor of citizens, the public is finally able to understand the true severity of police brutality within the United States. The following considerations aim to address the lack of accountability and transparency of police brutality in the United States today. Part III will show how advancements in technology brings police brutality to the forefront of our nation’s issues by creating an informed society. Part IV will describe how individual states control the use of private cameras and cell phones of citizens to capture occurrences of police brutality. States do this by employing anti-wiretapping statutes to citizens’ recordings of on-duty police officers. Part V will demonstrate how citizens’ recordings of police brutality are vital for accountability. Finally, Part VI will conclude by encouraging community policing as a solution to police brutality. PubDate: Mon, 05 Mar 2018 10:37:42 PST
- Ignorance of Technology a Pass for Violating Child Pornography Laws'
– What’s the Cache', 33 J. Marshall J. Info. Tech. & Privacy L. 47 (2017)- Authors: Angela Lewosz
Abstract: This comment explains how the cache works, discusses computer forensic examinations, and provides a history of child pornography laws. It next explores how the courts have interpreted the changing pornography laws with advances in technology. It then specifically assesses the different approaches the courts take when reconciling the mens rea (the mental element) of knowledge in accordance with possession. Finally, this comment analyzes the strengths and flaws in the courts’ arguments and suggests a proposal for how the courts should deal with the cache in relation to the criminalization of possession within the federal child pornography laws. PubDate: Mon, 05 Mar 2018 10:37:39 PST
|